Passed
Push — release_2_1 ( b6f83a...246761 )
by Tomasz
09:58
created
web/admin/inc/filepreview.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -22,7 +22,7 @@  discard block
 block discarded – undo
22 22
 ?>
23 23
 <?php
24 24
 
25
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
25
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
26 26
 
27 27
 $validator = new \web\lib\common\InputValidation();
28 28
 $idRaw = $_GET["id"] ?? "";
@@ -37,7 +37,7 @@  discard block
 block discarded – undo
37 37
         // Set data type and caching for 30 days
38 38
         $info = new finfo();
39 39
         $filetype = $info->buffer($finalBlob, FILEINFO_MIME_TYPE);
40
-        header("Content-type: " . $filetype);
40
+        header("Content-type: ".$filetype);
41 41
 
42 42
         switch ($filetype) {
43 43
             case "text/rtf": // fall-through, same treatment
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
         header("Cache-Control: must-revalidate");
55 55
         $offset = 60 * 60 * 24 * 30;
56 56
         // gmdate can't possibly fail, because it operates on time() and an integer offset
57
-        $ExpStr = "Expires: " . /** @scrutinizer ignore-type */ gmdate("D, d M Y H:i:s", time() + $offset) . " GMT";
57
+        $ExpStr = "Expires: "./** @scrutinizer ignore-type */ gmdate("D, d M Y H:i:s", time() + $offset)." GMT";
58 58
         header($ExpStr);
59 59
         //  Print out the image
60 60
         echo $finalBlob;
Please login to merge, or discard this patch.
web/admin/inc/userStats.inc.php 1 patch
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -9,7 +9,7 @@  discard block
 block discarded – undo
9 9
  * ******************************************************************************
10 10
  */
11 11
 
12
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
12
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
13 13
 
14 14
 $auth = new \web\lib\admin\Authentication();
15 15
 $auth->authenticate();
@@ -29,31 +29,31 @@  discard block
 block discarded – undo
29 29
 ?>
30 30
 
31 31
 <h1><?php $tablecaption = _("User Authentication Records"); echo $tablecaption; ?></h1>
32
-<p><?php echo _("Note that:");?></p>
32
+<p><?php echo _("Note that:"); ?></p>
33 33
 <ul>
34
-    <li><?php echo _("Authentication records are deleted after six months retention time");?></li>
35
-    <li><?php echo _("Operator Domain is based on the RADIUS attribute 'Operator-Name' and not sent by all hotspots");?></li>
36
-    <li><?php echo _("Different MAC addresses per credential may be due to MAC Address randomisation in recent operating systems");?></li>
34
+    <li><?php echo _("Authentication records are deleted after six months retention time"); ?></li>
35
+    <li><?php echo _("Operator Domain is based on the RADIUS attribute 'Operator-Name' and not sent by all hotspots"); ?></li>
36
+    <li><?php echo _("Different MAC addresses per credential may be due to MAC Address randomisation in recent operating systems"); ?></li>
37 37
 </ul>
38 38
 <table class='authrecord'>
39
-    <caption><?php echo $tablecaption;?></caption>
39
+    <caption><?php echo $tablecaption; ?></caption>
40 40
     <tr>
41
-        <th scope="col"><strong><?php echo _("Timestamp");?></strong></th>
42
-        <th scope="col"><strong><?php echo _("Credential");?></strong></th>
43
-        <th scope="col"><strong><?php echo _("MAC Address");?></strong></th>
44
-        <th scope="col"><strong><?php echo _("Result");?></strong></th>
45
-        <th scope="col"><strong><?php echo _("Operator Domain");?></strong></th>
41
+        <th scope="col"><strong><?php echo _("Timestamp"); ?></strong></th>
42
+        <th scope="col"><strong><?php echo _("Credential"); ?></strong></th>
43
+        <th scope="col"><strong><?php echo _("MAC Address"); ?></strong></th>
44
+        <th scope="col"><strong><?php echo _("Result"); ?></strong></th>
45
+        <th scope="col"><strong><?php echo _("Operator Domain"); ?></strong></th>
46 46
     </tr>
47 47
     <?php
48 48
     $userAuthData = $profile->getUserAuthRecords($userInt);
49 49
     foreach ($userAuthData as $oneRecord) {
50
-        echo "<tr class='".($oneRecord['RESULT'] == "Access-Accept" ? "auth-success" : "auth-fail" )."'>"
50
+        echo "<tr class='".($oneRecord['RESULT'] == "Access-Accept" ? "auth-success" : "auth-fail")."'>"
51 51
                 . "<td>".$oneRecord['TIMESTAMP']."</td>"
52 52
                 // $oneRecord['CN'] is a simple string, not an array, so disable Scrutinizer type check here
53
-                . "<td>"./** @scrutinizer ignore-type */ substr_replace($oneRecord['CN'], "@…", strpos($oneRecord['CN'],"@"))."</td>"
53
+                . "<td>"./** @scrutinizer ignore-type */ substr_replace($oneRecord['CN'], "@…", strpos($oneRecord['CN'], "@"))."</td>"
54 54
                 . "<td>".$oneRecord['MAC']."</td>"
55 55
                 . "<td>".($oneRecord['RESULT'] == "Access-Accept" ? _("Success") : _("Failure"))."</td>"
56
-                . "<td>".substr($oneRecord['OPERATOR'] ?? "1(unknown)",1)."</td>"
56
+                . "<td>".substr($oneRecord['OPERATOR'] ?? "1(unknown)", 1)."</td>"
57 57
                 . "</tr>";
58 58
     }
59 59
     ?>
Please login to merge, or discard this patch.
core/CertificationAuthorityEmbeddedECDSA.php 1 patch
Spacing   +21 added lines, -21 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@  discard block
 block discarded – undo
16 16
 class CertificationAuthorityEmbeddedECDSA extends EntityWithDBProperties implements CertificationAuthorityInterface
17 17
 {
18 18
 
19
-    private const LOCATION_ROOT_CA = ROOT . "/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
-    private const LOCATION_ISSUING_CA = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.pem";
21
-    private const LOCATION_ISSUING_KEY = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.key";
22
-    private const LOCATION_CONFIG = ROOT . "/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
19
+    private const LOCATION_ROOT_CA = ROOT."/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
+    private const LOCATION_ISSUING_CA = ROOT."/config/SilverbulletClientCerts/real-ECDSA.pem";
21
+    private const LOCATION_ISSUING_KEY = ROOT."/config/SilverbulletClientCerts/real-ECDSA.key";
22
+    private const LOCATION_CONFIG = ROOT."/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
23 23
 
24 24
     /**
25 25
      * string with the PEM variant of the root CA
@@ -66,29 +66,29 @@  discard block
 block discarded – undo
66 66
         parent::__construct();
67 67
         $this->rootPem = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
68 68
         if ($this->rootPem === FALSE) {
69
-            throw new Exception("Root CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
69
+            throw new Exception("Root CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
70 70
         }
71 71
         $this->issuingCertRaw = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
72 72
         if ($this->issuingCertRaw === FALSE) {
73
-            throw new Exception("Issuing CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
73
+            throw new Exception("Issuing CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
74 74
         }
75 75
         $rootParsed = openssl_x509_read($this->rootPem);
76 76
         $issuingCertCandidate = openssl_x509_read($this->issuingCertRaw);
77
-        if ($issuingCertCandidate === FALSE || is_resource($issuingCertCandidate)|| $rootParsed === FALSE) {
77
+        if ($issuingCertCandidate === FALSE || is_resource($issuingCertCandidate) || $rootParsed === FALSE) {
78 78
             throw new Exception("At least one CA PEM file did not parse correctly (or not a PHP8 resource)!");
79 79
         }
80 80
         $this->issuingCert = $issuingCertCandidate;
81 81
         
82 82
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY) === FALSE) {
83
-            throw new Exception("Private key not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
83
+            throw new Exception("Private key not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
84 84
         }
85
-        $issuingKeyTemp = openssl_pkey_get_private("file://" . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
85
+        $issuingKeyTemp = openssl_pkey_get_private("file://".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
86 86
         if ($issuingKeyTemp === FALSE || is_resource($issuingKeyTemp)) {
87 87
             throw new Exception("The private key did not parse correctly (or not a PHP8 resource)!");
88 88
         }
89 89
         $this->issuingKey = $issuingKeyTemp;
90 90
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG) === FALSE) {
91
-            throw new Exception("openssl configuration not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
91
+            throw new Exception("openssl configuration not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
92 92
         }
93 93
         $this->conffile = CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG;
94 94
     }
@@ -131,27 +131,27 @@  discard block
 block discarded – undo
131 131
         // generate stub index.txt file
132 132
         $tempdirArray = \core\common\Entity::createTemporaryDirectory("test");
133 133
         $tempdir = $tempdirArray['dir'];
134
-        $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
135
-        $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
134
+        $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
135
+        $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
136 136
         // serials for our CA are always integers
137 137
         $serialHex = strtoupper(dechex((int) $cert->serial));
138 138
         if (strlen($serialHex) % 2 == 1) {
139
-            $serialHex = "0" . $serialHex;
139
+            $serialHex = "0".$serialHex;
140 140
         }
141 141
 
142
-        $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$federation/CN=$cert->username\n";
142
+        $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$federation/CN=$cert->username\n";
143 143
         $this->loggerInstance->debug(4, "index.txt contents-to-be: $indexStatement");
144
-        if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
144
+        if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
145 145
             $this->loggerInstance->debug(1, "Unable to write openssl index.txt file for revocation handling!");
146 146
         }
147 147
         // index.txt.attr is dull but needs to exist
148
-        file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
148
+        file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
149 149
         // call "openssl ocsp" to manufacture our own OCSP statement
150 150
         // adding "-rmd sha1" to the following command-line makes the
151 151
         // choice of signature algorithm for the response explicit
152 152
         // but it's only available from openssl-1.1.0 (which we do not
153 153
         // want to require just for that one thing).
154
-        $execCmd = \config\Master::PATHS['openssl'] . " ocsp -issuer " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rsigner " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rkey " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY . " -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
154
+        $execCmd = \config\Master::PATHS['openssl']." ocsp -issuer ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rsigner ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rkey ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY." -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
155 155
         $this->loggerInstance->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
156 156
         $output = [];
157 157
         $return = 999;
@@ -159,11 +159,11 @@  discard block
 block discarded – undo
159 159
         if ($return !== 0) {
160 160
             throw new Exception("Non-zero return value from openssl ocsp!");
161 161
         }
162
-        $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
162
+        $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
163 163
         // remove the temp dir!
164
-        unlink($tempdir . "/$serialHex.response.der");
165
-        unlink($tempdir . "/index.txt.attr");
166
-        unlink($tempdir . "/index.txt");
164
+        unlink($tempdir."/$serialHex.response.der");
165
+        unlink($tempdir."/index.txt.attr");
166
+        unlink($tempdir."/index.txt");
167 167
         rmdir($tempdir);
168 168
         $this->databaseHandle->exec("UPDATE silverbullet_certificate SET OCSP = ?, OCSP_timestamp = NOW() WHERE serial_number = ?", "si", $ocsp, $cert->serial);
169 169
         return $ocsp;
Please login to merge, or discard this patch.
web/diag/adminQuery.php 1 patch
Spacing   +44 added lines, -44 removed lines patch added patch discarded remove patch
@@ -19,7 +19,7 @@  discard block
 block discarded – undo
19 19
  * License: see the web/copyright.inc.php file in the file structure or
20 20
  *          <base_url>/copyright.php after deploying the software
21 21
  */
22
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
22
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
23 23
 $languageInstance = new \core\common\Language();
24 24
 $languageInstance->setTextDomain("diagnostics");
25 25
 $loggerInstance = new \core\common\Logging();
@@ -61,43 +61,43 @@  discard block
 block discarded – undo
61 61
     $select = "<div id='sp_abuse_problem'>
62 62
 <select style='margin-left: 0px;' id='select_sp_problem'>";
63 63
     foreach ($sp_problem as $pname => $pdesc) {
64
-        $select = $select . "<option value='$pname'>$pdesc</option>\n";
64
+        $select = $select."<option value='$pname'>$pdesc</option>\n";
65 65
     }
66
-    $select = $select . "</select></div>";
66
+    $select = $select."</select></div>";
67 67
     $res = "
68 68
 <input type='hidden' name='token' id='token' value=''>
69 69
 <input type='hidden' name='tests_result' id='tests_result' value=''>
70 70
 <table id='sp_questions'>
71 71
     <tr id='sp_problem_selector'>
72
-        <td>" . _("Select your problem") . "</td>
72
+        <td>" . _("Select your problem")."</td>
73 73
         <td>$select</td>
74 74
     </tr>
75 75
     <tr>
76
-        <td>" . _("What is the realm of the IdP in question?") . "</td>
76
+        <td>"._("What is the realm of the IdP in question?")."</td>
77 77
         <td>
78 78
                 <input type='text' name='admin_realm' id='admin_realm' value='$realmFromURL'>
79
-                <button class='diag_button' id='realm_in_db_admin' style='display: none;' accesskey='R' type='button'>" .
80
-                _("Check this realm") .
79
+                <button class='diag_button' id='realm_in_db_admin' style='display: none;' accesskey='R' type='button'>".
80
+                _("Check this realm").
81 81
                 "</button>
82 82
                 <div id='tests_info_area'></div>
83 83
         </td>
84 84
     </tr>
85 85
     <tr class='hidden_row'>
86
-        <td>" . _("What is the authentication timestamp of the user session in question?") . "</td>
86
+        <td>" . _("What is the authentication timestamp of the user session in question?")."</td>
87 87
         <td><input type='text' id='timestamp' name='timestamp'>
88 88
             <div id='datepicker'></div>
89 89
         </td>
90 90
     </tr>
91 91
     <tr class='hidden_row'>
92
-        <td>" . _("What is the MAC address of the user session in question?") . "</td>
92
+        <td>" . _("What is the MAC address of the user session in question?")."</td>
93 93
         <td><input type='text' id='mac' name='mac'></td>
94 94
     </tr>
95 95
     <tr class='hidden_row'>
96
-        <td>" . _("Additional comments") . "</td>
96
+        <td>" . _("Additional comments")."</td>
97 97
         <td><textarea id='freetext' name='freetext' cols='60' rows='5'></textarea></td>
98 98
     </tr>
99 99
     <tr class='hidden_row'>
100
-        <td>" . _("Please specify an email address on which the IdP can contact you") . "</td>
100
+        <td>" . _("Please specify an email address on which the IdP can contact you")."</td>
101 101
         <td><input type='text' id='email' name='email'></td>
102 102
     </tr>
103 103
     <tr>
@@ -105,82 +105,82 @@  discard block
 block discarded – undo
105 105
         <td></td>
106 106
     </tr>
107 107
     <tr class='hidden_row' id='send_query_to_idp'>
108
-        <td>" . _("Now you can send your query") . "</td>
109
-        <td><button type='submit' class='diag_button' id='submit_idp_query' name='go'>" . _("Send") . "</button></td>
108
+        <td>" . _("Now you can send your query")."</td>
109
+        <td><button type='submit' class='diag_button' id='submit_idp_query' name='go'>" . _("Send")."</button></td>
110 110
     </tr>
111 111
  </table>";
112
-    $res = $res . $javascript;
112
+    $res = $res.$javascript;
113 113
 }
114 114
 if ($queryType == 'idp') {
115 115
     $select = "<div id='idp_reported_problem' style='display:;'>
116 116
 <select style='margin-left:0px;' id='select_idp_problem'>";
117 117
     foreach ($idp_problem as $pname => $pdesc) {
118
-        $select = $select . "<option value='$pname'>$pdesc</option>\n";
118
+        $select = $select."<option value='$pname'>$pdesc</option>\n";
119 119
     }
120
-    $select = $select . "</select></div>";
120
+    $select = $select."</select></div>";
121 121
     $res = "
122 122
 <table id='idp_questions'>
123 123
     <tr>
124
-        <td>" . _("Select your problem") . "</td>
124
+        <td>" . _("Select your problem")."</td>
125 125
         <td>$select</td>
126 126
     </tr>
127 127
     <tr>
128
-        <td>" . _("Identify the SP by one of following means") . "</td>
128
+        <td>"._("Identify the SP by one of following means")."</td>
129 129
         <td></td>
130 130
     </tr>
131 131
     <tr id='by_opname'>
132
-        <td>" . _("SP Operator-Name attribute") . "</td>
132
+        <td>" . _("SP Operator-Name attribute")."</td>
133 133
         <td><input type='text' id='opname' name='opname' value=''></td>
134 134
     </tr>
135 135
     <tr id='spmanually'>
136
-        <td>" . _("Select the SP manually:") . "</td>
136
+        <td>" . _("Select the SP manually:")."</td>
137 137
         <td>
138 138
             <div id='select_asp_country'><a href='' id='asp_countries_list'>
139
-            <span id='opnameselect'>" . _("click to select country and organisation") . "</a></span>
139
+            <span id='opnameselect'>" . _("click to select country and organisation")."</a></span>
140 140
             </div>
141 141
             <div id='select_asp_area'></div>
142 142
         </td>
143 143
     </tr>
144 144
     <tr id='asp_desc' style='display: none;'>
145
-        <td>" . _("or") . ' ' . _("at least describe the SP location") . "</td>
145
+        <td>" . _("or").' '._("at least describe the SP location")."</td>
146 146
         <td><input type='text' id='asp_location' name='asp_location' value=''></td>
147 147
     </tr>
148 148
     <tr>
149
-        <td>" . _("What is the outer ID of the user session in question?") . "</td>
149
+        <td>" . _("What is the outer ID of the user session in question?")."</td>
150 150
         <td><input type='text' id='outer_id' name='outer_id' value=''></td>
151 151
     </tr>
152 152
     <tr>
153
-        <td>" . _("What is the authentication timestamp of the user session in question?") . "</td>
153
+        <td>" . _("What is the authentication timestamp of the user session in question?")."</td>
154 154
         <td>
155 155
             <input type='text' id='timestamp' name='timestamp'>
156 156
             <div id='datepicker'></div>
157 157
         </td>
158 158
     </tr>
159 159
     <tr>
160
-        <td>" . _("What is the MAC address of the user session in question?") . "</td>
160
+        <td>" . _("What is the MAC address of the user session in question?")."</td>
161 161
         <td><input type='text' id='mac' name='mac'></td>
162 162
     </tr>
163 163
     <tr>
164
-        <td>" . _("Additional comments about the problem") . "</td>
164
+        <td>" . _("Additional comments about the problem")."</td>
165 165
         <td><textarea id='freetext' name='freetext' cols='60' rows='5'></textarea></td>
166 166
     </tr>
167 167
     <tr>
168
-        <td>" . _("Do you have any contact details by which the user wishes to be contacted by the SP?") . "</td>
168
+        <td>" . _("Do you have any contact details by which the user wishes to be contacted by the SP?")."</td>
169 169
         <td><textarea id='c_details' name='c_details' cols='60' rows='5'></textarea></td>
170 170
     </tr>
171 171
     <tr>
172
-        <td>" . _("Please specify an email address on which the SP can contact you") . "</td>
172
+        <td>" . _("Please specify an email address on which the SP can contact you")."</td>
173 173
         <td><input type='text' id='email' name='email'></td>
174 174
     </tr>
175 175
     <tr class='hidden_row' id='send_query_to_sp'>
176
-        <td>" . _("Now you can send your query") . "</td>
177
-        <td><button type='submit' class='diag_button' id='submit_sp_query' name='go'>" . _("Send") . "</button></td>
176
+        <td>" . _("Now you can send your query")."</td>
177
+        <td><button type='submit' class='diag_button' id='submit_sp_query' name='go'>" . _("Send")."</button></td>
178 178
     </tr>
179 179
 </table>";
180
-    $res = $res . $javascript;
180
+    $res = $res.$javascript;
181 181
 }
182 182
 if ($queryType == 'idp_send' || $queryType == 'sp_send') {
183
-    include_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
183
+    include_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
184 184
     $cat = new \core\CAT();
185 185
     $returnArray = array();
186 186
     if (count((array) $o) > 0) {
@@ -189,8 +189,8 @@  discard block
 block discarded – undo
189 189
             switch ($key) {
190 190
                 case 'realm':
191 191
                     $pos = strpos($value, '@');
192
-                    if ($pos !== FALSE ) {
193
-                        $value = substr($value, $pos+1);
192
+                    if ($pos !== FALSE) {
193
+                        $value = substr($value, $pos + 1);
194 194
                     }
195 195
                 case 'email':
196 196
                     $returnArray[$key] = filter_var($value, FILTER_VALIDATE_EMAIL);
@@ -231,7 +231,7 @@  discard block
 block discarded – undo
231 231
         $mail = \core\common\OutsideComm::mailHandle();
232 232
         $emails = ['[email protected]'];
233 233
         //$emails = explode(',', $returnArray['idpcontact']);
234
-        $mail->FromName = \config\Master::APPEARANCE['productname'] . " Notification System";
234
+        $mail->FromName = \config\Master::APPEARANCE['productname']." Notification System";
235 235
         foreach ($emails as $email) {
236 236
             $mail->addAddress($email);
237 237
         }
@@ -241,11 +241,11 @@  discard block
 block discarded – undo
241 241
         } else {
242 242
             $link = 'http://';
243 243
         }
244
-        $link .= $_SERVER['SERVER_NAME'] . \core\CAT::getRootUrlPath() . '/diag/show_realmcheck.php?token=' . $returnArray['token'];
244
+        $link .= $_SERVER['SERVER_NAME'].\core\CAT::getRootUrlPath().'/diag/show_realmcheck.php?token='.$returnArray['token'];
245 245
         $returnArray['testurl'] = $link;
246 246
         $mail->Subject = _('Suspected a technical problem with the IdP');
247
-        $txt = _("We suspect a technical problem with the IdP handling the realm") . ' ' . 
248
-                $returnArray['realm'] . ".\n";
247
+        $txt = _("We suspect a technical problem with the IdP handling the realm").' '. 
248
+                $returnArray['realm'].".\n";
249 249
         $txt .= _("The CAT diagnostic test was run for this realm during reporting.\n");
250 250
         $txt .= _("The overall result was ");
251 251
         if ($returnArray['tests_result'] == 0) {
@@ -253,15 +253,15 @@  discard block
 block discarded – undo
253 253
         } else {
254 254
             $txt .= _("failure");
255 255
         }
256
-        $txt .= ".\n" . _("To see details go to ");
256
+        $txt .= ".\n"._("To see details go to ");
257 257
         $txt .= "$link\n\n";
258
-        $txt .= _("The reported problem details are as follows") . "\n";
259
-        $txt .= _("timestamp") . ": " . $returnArray['timestamp'] . "\n";
260
-        $txt .= _("client MAC address") . ": " . $returnArray['mac'] . "\n";
258
+        $txt .= _("The reported problem details are as follows")."\n";
259
+        $txt .= _("timestamp").": ".$returnArray['timestamp']."\n";
260
+        $txt .= _("client MAC address").": ".$returnArray['mac']."\n";
261 261
         if ($returnArray['freetext']) {
262
-            $txt .= _("additional comments") . ': ' . $returnArray['freetext'] . "\n";
262
+            $txt .= _("additional comments").': '.$returnArray['freetext']."\n";
263 263
         }
264
-        $txt .= "\n" . _("You can contact the incident reporter at") . ' ' . $returnArray['email'];
264
+        $txt .= "\n"._("You can contact the incident reporter at").' '.$returnArray['email'];
265 265
         
266 266
         $mail->Body = $txt;
267 267
         $sent = $mail->send();
Please login to merge, or discard this patch.
core/diag/RADIUSTests.php 1 patch
Spacing   +58 added lines, -59 removed lines patch added patch discarded remove patch
@@ -165,7 +165,7 @@  discard block
 block discarded – undo
165 165
             }
166 166
         }
167 167
 
168
-        $this->loggerInstance->debug(4, "RADIUSTests is in opMode " . $this->opMode . ", parameters were: $realm, $outerUsernameForChecks, " . /** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
168
+        $this->loggerInstance->debug(4, "RADIUSTests is in opMode ".$this->opMode.", parameters were: $realm, $outerUsernameForChecks, "./** @scrutinizer ignore-type */ print_r($supportedEapTypes, true));
169 169
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedServerNames, true));
170 170
         $this->loggerInstance->debug(4, /** @scrutinizer ignore-type */ print_r($expectedCABundle, true));
171 171
 
@@ -252,7 +252,7 @@  discard block
 block discarded – undo
252 252
                 $returnarray[] = RADIUSTests::CERTPROB_WILDCARD_IN_NAME;
253 253
                 continue; // otherwise we'd ALSO complain that it's not a real hostname
254 254
             }
255
-            if ($onename != "" && filter_var("foo@" . idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
255
+            if ($onename != "" && filter_var("foo@".idn_to_ascii($onename), FILTER_VALIDATE_EMAIL) === FALSE) {
256 256
                 $returnarray[] = RADIUSTests::CERTPROB_NOT_A_HOSTNAME;
257 257
             }
258 258
         }
@@ -278,7 +278,7 @@  discard block
 block discarded – undo
278 278
             $probValue = RADIUSTests::CERTPROB_SHA1_SIGNATURE;
279 279
             $returnarray[] = $probValue;
280 280
         }
281
-        $this->loggerInstance->debug(4, "CERT IS: " . /** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
281
+        $this->loggerInstance->debug(4, "CERT IS: "./** @scrutinizer ignore-type */ print_r($intermediateCa, TRUE));
282 282
         if ($intermediateCa['basicconstraints_set'] == 0) {
283 283
             $returnarray[] = RADIUSTests::CERTPROB_NO_BASICCONSTRAINTS;
284 284
         }
@@ -326,7 +326,7 @@  discard block
 block discarded – undo
326 326
     public function udpReachability($probeindex, $opnameCheck = TRUE, $frag = TRUE) {
327 327
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
328 328
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
329
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
329
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
330 330
         if ($clientcert === FALSE) {
331 331
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
332 332
         }
@@ -335,7 +335,7 @@  discard block
 block discarded – undo
335 335
         if ($this->opMode == self::RADIUS_TEST_OPERATION_MODE_THOROUGH) {
336 336
             return $this->udpLogin($probeindex, $this->supportedEapTypes[0]->getArrayRep(), $this->outerUsernameForChecks, 'eaplab', $opnameCheck, $frag, $clientcert);
337 337
         }
338
-        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@" . $this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
338
+        return $this->udpLogin($probeindex, \core\common\EAP::EAPTYPE_ANY, "cat-connectivity-test@".$this->realm, 'eaplab', $opnameCheck, $frag, $clientcert);
339 339
     }
340 340
 
341 341
     /**
@@ -356,7 +356,7 @@  discard block
 block discarded – undo
356 356
             return RADIUSTests::CERTPROB_NO_CDP_HTTP;
357 357
         }
358 358
         // first and second sub-match is the full URL... check it
359
-        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1] . $crlUrl[2]));
359
+        $crlcontent = \core\common\OutsideComm::downloadFile(trim($crlUrl[1].$crlUrl[2]));
360 360
         if ($crlcontent === FALSE) {
361 361
             return RADIUSTests::CERTPROB_NO_CRL_AT_CDP_URL;
362 362
         }
@@ -371,7 +371,7 @@  discard block
 block discarded – undo
371 371
         // $pem = chunk_split(base64_encode($crlcontent), 64, "\n");
372 372
         // inspired by https://stackoverflow.com/questions/2390604/how-to-pass-variables-as-stdin-into-command-line-from-php
373 373
 
374
-        $proc = \config\Master::PATHS['openssl'] . " crl -inform der";
374
+        $proc = \config\Master::PATHS['openssl']." crl -inform der";
375 375
         $descriptorspec = [
376 376
             0 => ["pipe", "r"],
377 377
             1 => ["pipe", "w"],
@@ -409,7 +409,7 @@  discard block
 block discarded – undo
409 409
         $origLength = strlen($hex);
410 410
         for ($i = 1; $i < $origLength; $i++) {
411 411
             if ($i % 2 == 1 && $i != strlen($hex)) {
412
-                $spaced .= $hex[$i] . " ";
412
+                $spaced .= $hex[$i]." ";
413 413
             } else {
414 414
                 $spaced .= $hex[$i];
415 415
             }
@@ -534,19 +534,19 @@  discard block
 block discarded – undo
534 534
         $eapText = \core\common\EAP::eapDisplayName($eaptype);
535 535
         $config = '
536 536
 network={
537
-  ssid="' . \config\Master::APPEARANCE['productname'] . ' testing"
537
+  ssid="' . \config\Master::APPEARANCE['productname'].' testing"
538 538
   key_mgmt=WPA-EAP
539 539
   proto=WPA2
540 540
   pairwise=CCMP
541 541
   group=CCMP
542 542
   ';
543 543
 // phase 1
544
-        $config .= 'eap=' . $eapText['OUTER'] . "\n";
544
+        $config .= 'eap='.$eapText['OUTER']."\n";
545 545
         $logConfig = $config;
546 546
 // phase 2 if applicable; all inner methods have passwords
547 547
         if (isset($eapText['INNER']) && $eapText['INNER'] != "") {
548
-            $config .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
549
-            $logConfig .= '  phase2="auth=' . $eapText['INNER'] . "\"\n";
548
+            $config .= '  phase2="auth='.$eapText['INNER']."\"\n";
549
+            $logConfig .= '  phase2="auth='.$eapText['INNER']."\"\n";
550 550
         }
551 551
 // all methods set a password, except EAP-TLS
552 552
         if ($eaptype != \core\common\EAP::EAPTYPE_TLS) {
@@ -562,11 +562,11 @@  discard block
 block discarded – undo
562 562
         }
563 563
 
564 564
 // inner identity
565
-        $config .= '  identity="' . $inner . "\"\n";
566
-        $logConfig .= '  identity="' . $inner . "\"\n";
565
+        $config .= '  identity="'.$inner."\"\n";
566
+        $logConfig .= '  identity="'.$inner."\"\n";
567 567
 // outer identity, may be equal
568
-        $config .= '  anonymous_identity="' . $outer . "\"\n";
569
-        $logConfig .= '  anonymous_identity="' . $outer . "\"\n";
568
+        $config .= '  anonymous_identity="'.$outer."\"\n";
569
+        $logConfig .= '  anonymous_identity="'.$outer."\"\n";
570 570
 // done
571 571
         $config .= "}";
572 572
         $logConfig .= "}";
@@ -627,13 +627,13 @@  discard block
 block discarded – undo
627 627
      * @return string the command-line for eapol_test
628 628
      */
629 629
     private function eapolTestConfig($probeindex, $opName, $frag) {
630
-        $cmdline = \config\Diagnostics::PATHS['eapol_test'] .
631
-                " -a " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'] .
632
-                " -s " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'] .
633
-                " -o serverchain.pem" .
634
-                " -c ./udp_login_test.conf" .
635
-                " -M 22:44:66:CA:20:" . sprintf("%02d", $probeindex) . " " .
636
-                " -t " . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout'] . " ";
630
+        $cmdline = \config\Diagnostics::PATHS['eapol_test'].
631
+                " -a ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['ip'].
632
+                " -s ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['secret'].
633
+                " -o serverchain.pem".
634
+                " -c ./udp_login_test.conf".
635
+                " -M 22:44:66:CA:20:".sprintf("%02d", $probeindex)." ".
636
+                " -t ".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$probeindex]['timeout']." ";
637 637
         if ($opName) {
638 638
             $cmdline .= '-N126:s:"1cat.eduroam.org" ';
639 639
         }
@@ -662,10 +662,10 @@  discard block
 block discarded – undo
662 662
      * @throws Exception
663 663
      */
664 664
     private function createCArepository($tmpDir, &$intermOdditiesCAT, $servercert, $eapIntermediates, $eapIntermediateCRLs) {
665
-        if (!mkdir($tmpDir . "/root-ca-allcerts/", 0700, true)) {
665
+        if (!mkdir($tmpDir."/root-ca-allcerts/", 0700, true)) {
666 666
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-allcerts/\n");
667 667
         }
668
-        if (!mkdir($tmpDir . "/root-ca-eaponly/", 0700, true)) {
668
+        if (!mkdir($tmpDir."/root-ca-eaponly/", 0700, true)) {
669 669
             throw new Exception("unable to create root CA directory (RADIUS Tests): $tmpDir/root-ca-eaponly/\n");
670 670
         }
671 671
 // make a copy of the EAP-received chain and add the configured intermediates, if any
@@ -679,15 +679,15 @@  discard block
 block discarded – undo
679 679
             }
680 680
             if ($decoded['ca'] == 1) {
681 681
                 if ($decoded['root'] == 1) { // save CAT roots to the root directory
682
-                    file_put_contents($tmpDir . "/root-ca-eaponly/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
683
-                    file_put_contents($tmpDir . "/root-ca-allcerts/configuredroot" . count($catRoots) . ".pem", $decoded['pem']);
682
+                    file_put_contents($tmpDir."/root-ca-eaponly/configuredroot".count($catRoots).".pem", $decoded['pem']);
683
+                    file_put_contents($tmpDir."/root-ca-allcerts/configuredroot".count($catRoots).".pem", $decoded['pem']);
684 684
                     $catRoots[] = $decoded['pem'];
685 685
                 } else { // save the intermediates to allcerts directory
686
-                    file_put_contents($tmpDir . "/root-ca-allcerts/cat-intermediate" . count($catIntermediates) . ".pem", $decoded['pem']);
686
+                    file_put_contents($tmpDir."/root-ca-allcerts/cat-intermediate".count($catIntermediates).".pem", $decoded['pem']);
687 687
                     $intermOdditiesCAT = array_merge($intermOdditiesCAT, $this->propertyCheckIntermediate($decoded));
688 688
                     if (isset($decoded['CRL']) && isset($decoded['CRL'][0])) {
689 689
                         $this->loggerInstance->debug(4, "got an intermediate CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
690
-                        file_put_contents($tmpDir . "/root-ca-allcerts/crl_cat" . count($catIntermediates) . ".pem", $decoded['CRL'][0]);
690
+                        file_put_contents($tmpDir."/root-ca-allcerts/crl_cat".count($catIntermediates).".pem", $decoded['CRL'][0]);
691 691
                     }
692 692
                     $catIntermediates[] = $decoded['pem'];
693 693
                 }
@@ -696,26 +696,26 @@  discard block
 block discarded – undo
696 696
         // save all intermediate certificates and CRLs to separate files in 
697 697
         // both root-ca directories
698 698
         foreach ($eapIntermediates as $index => $onePem) {
699
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediate$index.pem", $onePem);
700
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediate$index.pem", $onePem);
699
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediate$index.pem", $onePem);
700
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediate$index.pem", $onePem);
701 701
         }
702 702
         foreach ($eapIntermediateCRLs as $index => $onePem) {
703
-            file_put_contents($tmpDir . "/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
-            file_put_contents($tmpDir . "/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
703
+            file_put_contents($tmpDir."/root-ca-eaponly/intermediateCRL$index.pem", $onePem);
704
+            file_put_contents($tmpDir."/root-ca-allcerts/intermediateCRL$index.pem", $onePem);
705 705
         }
706 706
 
707 707
         $checkstring = "";
708 708
         if (isset($servercert['CRL']) && isset($servercert['CRL'][0])) {
709 709
             $this->loggerInstance->debug(4, "got a server CRL; adding them to the chain checks. (Remember: checking end-entity cert only, not the whole chain");
710 710
             $checkstring = "-crl_check_all";
711
-            file_put_contents($tmpDir . "/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
-            file_put_contents($tmpDir . "/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
711
+            file_put_contents($tmpDir."/root-ca-eaponly/crl-server.pem", $servercert['CRL'][0]);
712
+            file_put_contents($tmpDir."/root-ca-allcerts/crl-server.pem", $servercert['CRL'][0]);
713 713
         }
714 714
 
715 715
 
716 716
 // now c_rehash the root CA directory ...
717
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-eaponly/ > /dev/null");
718
-        system(\config\Diagnostics::PATHS['c_rehash'] . " $tmpDir/root-ca-allcerts/ > /dev/null");
717
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-eaponly/ > /dev/null");
718
+        system(\config\Diagnostics::PATHS['c_rehash']." $tmpDir/root-ca-allcerts/ > /dev/null");
719 719
         return $checkstring;
720 720
     }
721 721
 
@@ -747,12 +747,12 @@  discard block
 block discarded – undo
747 747
 // so test if there's something PEMy in the file at all
748 748
 // serverchain.pem is the output from eapol_test; incomingserver.pem is written by extractIncomingCertsfromEAP() if there was at least one server cert.
749 749
         if (filesize("$tmpDir/serverchain.pem") > 10 && filesize("$tmpDir/incomingserver.pem") > 10) {
750
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
751
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
752
-            $this->loggerInstance->debug(4, "Chain verify pass 1: " . /** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE) . "\n");
753
-            exec(\config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
754
-            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl'] . " verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
755
-            $this->loggerInstance->debug(4, "Chain verify pass 2: " . /** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE) . "\n");
750
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/incomingserver.pem", $verifyResultEaponly);
751
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-eaponly/ -purpose any $tmpDir/serverchain.pem\n");
752
+            $this->loggerInstance->debug(4, "Chain verify pass 1: "./** @scrutinizer ignore-type */ print_r($verifyResultEaponly, TRUE)."\n");
753
+            exec(\config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/incomingserver.pem", $verifyResultAllcerts);
754
+            $this->loggerInstance->debug(4, \config\Master::PATHS['openssl']." verify $crlCheckString -CApath $tmpDir/root-ca-allcerts/ -purpose any $tmpDir/serverchain.pem\n");
755
+            $this->loggerInstance->debug(4, "Chain verify pass 2: "./** @scrutinizer ignore-type */ print_r($verifyResultAllcerts, TRUE)."\n");
756 756
         }
757 757
 
758 758
 // now we do certificate verification against the collected parents
@@ -817,7 +817,7 @@  discard block
 block discarded – undo
817 817
         // we are UNHAPPY if no names match!
818 818
         $happiness = "UNHAPPY";
819 819
         foreach ($this->expectedServerNames as $expectedName) {
820
-            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: " . /** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE) . /** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
820
+            $this->loggerInstance->debug(4, "Managing expectations for $expectedName: "./** @scrutinizer ignore-type */ print_r($servercert['CN'], TRUE)./** @scrutinizer ignore-type */ print_r($servercert['sAN_DNS'], TRUE));
821 821
             if (array_search($expectedName, $servercert['CN']) !== FALSE && array_search($expectedName, $servercert['sAN_DNS']) !== FALSE) {
822 822
                 $this->loggerInstance->debug(4, "Totally happy!");
823 823
                 $happiness = "TOTALLY";
@@ -861,11 +861,11 @@  discard block
 block discarded – undo
861 861
         $theconfigs = $this->wpaSupplicantConfig($eaptype, $finalInner, $finalOuter, $password);
862 862
         // the config intentionally does not include CA checking. We do this
863 863
         // ourselves after getting the chain with -o.
864
-        file_put_contents($tmpDir . "/udp_login_test.conf", $theconfigs[0]);
864
+        file_put_contents($tmpDir."/udp_login_test.conf", $theconfigs[0]);
865 865
 
866 866
         $cmdline = $this->eapolTestConfig($probeindex, $opnameCheck, $frag);
867 867
         $this->loggerInstance->debug(4, "Shallow reachability check cmdline: $cmdline\n");
868
-        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n" . $theconfigs[1] . "\n");
868
+        $this->loggerInstance->debug(4, "Shallow reachability check config: $tmpDir\n".$theconfigs[1]."\n");
869 869
         $time_start = microtime(true);
870 870
         $pflow = [];
871 871
         exec($cmdline, $pflow);
@@ -874,7 +874,7 @@  discard block
 block discarded – undo
874 874
         }
875 875
         $time_stop = microtime(true);
876 876
         $output = print_r($this->redact($password, $pflow), TRUE);
877
-        file_put_contents($tmpDir . "/eapol_test_output_redacted_$probeindex.txt", $output);
877
+        file_put_contents($tmpDir."/eapol_test_output_redacted_$probeindex.txt", $output);
878 878
         $this->loggerInstance->debug(5, "eapol_test output saved to eapol_test_output_redacted_$probeindex.txt\n");
879 879
         return [
880 880
             "time" => ($time_stop - $time_start) * 1000,
@@ -910,7 +910,7 @@  discard block
 block discarded – undo
910 910
         if ($packetflow[count($packetflow) - 1] == 3 && $this->checkLineparse($packetflow_orig, self::LINEPARSE_CHECK_REJECTIGNORE)) {
911 911
             array_pop($packetflow);
912 912
         }
913
-        $this->loggerInstance->debug(5, "Packetflow: " . /** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
913
+        $this->loggerInstance->debug(5, "Packetflow: "./** @scrutinizer ignore-type */ print_r($packetflow, TRUE));
914 914
         $packetcount = array_count_values($packetflow);
915 915
         $testresults['packetcount'] = $packetcount;
916 916
         $testresults['packetflow'] = $packetflow;
@@ -950,7 +950,7 @@  discard block
 block discarded – undo
950 950
      */
951 951
     private function wasModernTlsNegotiated(&$testresults, $packetflow_orig) {
952 952
         $negotiatedTlsVersion = $this->checkLineparse($packetflow_orig, self::LINEPARSE_TLSVERSION);
953
-        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion" . "\n");
953
+        $this->loggerInstance->debug(4, "TLS version found is: $negotiatedTlsVersion"."\n");
954 954
         if ($negotiatedTlsVersion === FALSE) {
955 955
             $testresults['cert_oddities'][] = RADIUSTests::TLSPROB_UNKNOWN_TLS_VERSION;
956 956
         } elseif ($negotiatedTlsVersion != self::TLS_VERSION_1_2 && $negotiatedTlsVersion != self::TLS_VERSION_1_3) {
@@ -1008,7 +1008,7 @@  discard block
 block discarded – undo
1008 1008
 
1009 1009
         $x509 = new \core\common\X509();
1010 1010
 // $eap_certarray holds all certs received in EAP conversation
1011
-        $incomingData = file_get_contents($tmpDir . "/serverchain.pem");
1011
+        $incomingData = file_get_contents($tmpDir."/serverchain.pem");
1012 1012
         if ($incomingData !== FALSE && strlen($incomingData) > 0) {
1013 1013
             $eapCertArray = $x509->splitCertificate($incomingData);
1014 1014
         } else {
@@ -1039,10 +1039,10 @@  discard block
 block discarded – undo
1039 1039
                 case RADIUSTests::SERVER_CA_SELFSIGNED:
1040 1040
                     $servercert[] = $cert;
1041 1041
                     if (count($servercert) == 1) {
1042
-                        if (file_put_contents($tmpDir . "/incomingserver.pem", $cert['pem'] . "\n") === FALSE) {
1042
+                        if (file_put_contents($tmpDir."/incomingserver.pem", $cert['pem']."\n") === FALSE) {
1043 1043
                             $this->loggerInstance->debug(4, "The (first) server certificate could not be written to $tmpDir/incomingserver.pem!\n");
1044 1044
                         }
1045
-                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: " . /** @scrutinizer ignore-type */ print_r($servercert[0], true));
1045
+                        $this->loggerInstance->debug(4, "This is the (first) server certificate, with CRL content if applicable: "./** @scrutinizer ignore-type */ print_r($servercert[0], true));
1046 1046
                     } elseif (!in_array(RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS, $testresults['cert_oddities'])) {
1047 1047
                         $testresults['cert_oddities'][] = RADIUSTests::CERTPROB_TOO_MANY_SERVER_CERTS;
1048 1048
                     }
@@ -1112,7 +1112,7 @@  discard block
 block discarded – undo
1112 1112
     public function autodetectCAWithProbe($outerId) {
1113 1113
         // for EAP-TLS to be a viable option, we need to pass a random client cert to make eapol_test happy
1114 1114
         // the following PEM data is one of the SENSE EAPLab client certs (not secret at all)
1115
-        $clientcert = file_get_contents(dirname(__FILE__) . "/clientcert.p12");
1115
+        $clientcert = file_get_contents(dirname(__FILE__)."/clientcert.p12");
1116 1116
         if ($clientcert === FALSE) {
1117 1117
             throw new Exception("A dummy client cert is part of the source distribution, but could not be loaded!");
1118 1118
         }
@@ -1127,7 +1127,7 @@  discard block
 block discarded – undo
1127 1127
         $tmpDir = $temporary['dir'];
1128 1128
         chdir($tmpDir);
1129 1129
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1130
-        file_put_contents($tmpDir . "/client.p12", $clientcert);
1130
+        file_put_contents($tmpDir."/client.p12", $clientcert);
1131 1131
         $testresults = ['cert_oddities' => []];
1132 1132
         $runtime_results = $this->executeEapolTest($tmpDir, $probeindex, \core\common\EAP::EAPTYPE_ANY, $outerId, $outerId, "eaplab", FALSE, FALSE);
1133 1133
         $packetflow_orig = $runtime_results['output'];
@@ -1143,8 +1143,7 @@  discard block
 block discarded – undo
1143 1143
         // that's not the case if we do EAP-pwd or could not negotiate an EAP method at
1144 1144
         // all
1145 1145
         // in that case: no server CA guess possible
1146
-        if (!
1147
-                ($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1146
+        if (!($radiusResult == RADIUSTests::RETVAL_CONVERSATION_REJECT && $negotiatedEapType) || $radiusResult == RADIUSTests::RETVAL_OK
1148 1147
         ) {
1149 1148
             return RADIUSTests::RETVAL_INVALID;
1150 1149
         }
@@ -1183,7 +1182,7 @@  discard block
 block discarded – undo
1183 1182
         // trust, and custom ones we may have configured
1184 1183
         $ourRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-custom']);
1185 1184
         $mozillaRoots = file_get_contents(\config\ConfAssistant::PATHS['trust-store-mozilla']);
1186
-        $allRoots = $x509->splitCertificate($ourRoots . "\n" . $mozillaRoots);
1185
+        $allRoots = $x509->splitCertificate($ourRoots."\n".$mozillaRoots);
1187 1186
         foreach ($allRoots as $oneRoot) {
1188 1187
             $processedRoot = $x509->processCertificate($oneRoot);
1189 1188
             if ($processedRoot['full_details']['subject'] == $currentHighestKnownIssuer) {
@@ -1225,7 +1224,7 @@  discard block
 block discarded – undo
1225 1224
         chdir($tmpDir);
1226 1225
         $this->loggerInstance->debug(4, "temp dir: $tmpDir\n");
1227 1226
         if ($clientcertdata !== NULL) {
1228
-            file_put_contents($tmpDir . "/client.p12", $clientcertdata);
1227
+            file_put_contents($tmpDir."/client.p12", $clientcertdata);
1229 1228
         }
1230 1229
         $testresults = [];
1231 1230
         // initialise the sub-array for cleaner parsing
@@ -1330,7 +1329,7 @@  discard block
 block discarded – undo
1330 1329
                     'issuer' => $this->printDN($certdata['issuer']),
1331 1330
                     'validFrom' => $this->printTm($certdata['validFrom_time_t']),
1332 1331
                     'validTo' => $this->printTm($certdata['validTo_time_t']),
1333
-                    'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']),
1332
+                    'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)", $certdata['serialNumber']),
1334 1333
                     'sha1' => $certdata['sha1'],
1335 1334
                     'extensions' => $certdata['extensions']
1336 1335
                 ];
Please login to merge, or discard this patch.
web/skins/modern/Divs.php 2 patches
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -124,7 +124,7 @@  discard block
 block discarded – undo
124 124
     public function divSilverbullet() {
125 125
         $retval = "
126 126
 <div id='silverbullet'>"
127
-               .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] .
127
+               .$this->Gui->textTemplates->templates[user\SB_GO_AWAY].
128 128
                 "</div>
129 129
     ";
130 130
         return $retval;
@@ -222,7 +222,7 @@  discard block
 block discarded – undo
222 222
 <div id='profiles'> <!-- this is the profile selection filled during run time -->
223 223
     <div id='profiles_h' class='sub_h'>".$this->Gui->textTemplates->templates[user\PROFILE_SELECTION]."
224 224
     </div>" .
225
-                "<select id='profile_list'></select><div id='profile_desc' class='profile_desc'></div>" .
225
+                "<select id='profile_list'></select><div id='profile_desc' class='profile_desc'></div>".
226 226
                 "</div>";
227 227
     }
228 228
 
@@ -250,7 +250,7 @@  discard block
 block discarded – undo
250 250
     public function divInstitution($selectButton = TRUE) {
251 251
         $retval = "<div id='institution_name'>
252 252
     <span id='inst_name_span'></span> <div id='inst_extra_text'></div><!-- this will be filled with the IdP name -->" .
253
-                ($selectButton ? "<a  id='select_another' class='signin' href=\"\">".$this->Gui->textTemplates->templates[user\INSTITUTION_SELECTION]."</a>" : "") .
253
+                ($selectButton ? "<a  id='select_another' class='signin' href=\"\">".$this->Gui->textTemplates->templates[user\INSTITUTION_SELECTION]."</a>" : "").
254 254
                 "</div>";
255 255
         $retval .= $this->emptyImage('idp_logo', 'IdP Logo');
256 256
         return $retval;
Please login to merge, or discard this patch.
Indentation   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -124,7 +124,7 @@  discard block
 block discarded – undo
124 124
     public function divSilverbullet() {
125 125
         $retval = "
126 126
 <div id='silverbullet'>"
127
-               .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] .
127
+                .$this->Gui->textTemplates->templates[user\SB_GO_AWAY] .
128 128
                 "</div>
129 129
     ";
130 130
         return $retval;
@@ -293,8 +293,8 @@  discard block
 block discarded – undo
293 293
                 }
294 294
 
295 295
                 $retval .= "<td><button name='$d' class='other_os' id='$d'>".$D['display']."</button>"
296
-                       ."</td>"
297
-                       ."<td><button name='$d' class='more_info_b' id='info_b_$d'>i</button></td></tr>\n";
296
+                        ."</td>"
297
+                        ."<td><button name='$d' class='more_info_b' id='info_b_$d'>i</button></td></tr>\n";
298 298
                 $deviceIndex++;
299 299
             }
300 300
             $retval .= "</tbody>";
@@ -341,11 +341,11 @@  discard block
 block discarded – undo
341 341
         <tr>
342 342
             <td>" .
343 343
                 $this->Gui->catVersion
344
-               ."
344
+                ."
345 345
             </td>";
346 346
 
347 347
         if (!empty(\config\Master::APPEARANCE['privacy_notice_url'])) {
348
-              $retval .= "<td>".$this->Gui->catCopyrifhtAndLicense."<br><span id='privacy_notice_cons'>".\config\ConfAssistant::CONSORTIUM['display_name']."</span> <a href='".\config\Master::APPEARANCE['privacy_notice_url']."'>".sprintf(_("%s Privacy Notice"), '')."</a></td>";
348
+                $retval .= "<td>".$this->Gui->catCopyrifhtAndLicense."<br><span id='privacy_notice_cons'>".\config\ConfAssistant::CONSORTIUM['display_name']."</span> <a href='".\config\Master::APPEARANCE['privacy_notice_url']."'>".sprintf(_("%s Privacy Notice"), '')."</a></td>";
349 349
         }
350 350
         $retval .= "<td>";
351 351
         if (\config\ConfAssistant::CONSORTIUM['name'] == "eduroam" && isset(\config\ConfAssistant::CONSORTIUM['deployment-voodoo']) && \config\ConfAssistant::CONSORTIUM['deployment-voodoo'] == "Operations Team") {
Please login to merge, or discard this patch.
devices/chromebook/DeviceChromebook.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -121,7 +121,7 @@  discard block
 block discarded – undo
121 121
         $cryptoJson = openssl_encrypt($clearJson, 'AES-256-CBC', $encryptionKey, OPENSSL_RAW_DATA, $initVector);
122 122
         $hmac = hash_hmac("sha1", $cryptoJson, $encryptionKey, TRUE);
123 123
 
124
-        $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = " . $password . "\nb(IV) = " . base64_encode($initVector) . "\nb(Cipher) = " . base64_encode($cryptoJson) . "\nb(HMAC) = " . base64_encode($hmac));
124
+        $this->loggerInstance->debug(4, "Clear = $clearJson\nSalt = $salt\nPW = ".$password."\nb(IV) = ".base64_encode($initVector)."\nb(Cipher) = ".base64_encode($cryptoJson)."\nb(HMAC) = ".base64_encode($hmac));
125 125
 
126 126
         // now, generate the container that holds all the crypto data
127 127
         $finalArray = [
@@ -195,7 +195,7 @@  discard block
 block discarded – undo
195 195
     private function wiredBlock($eapdetails)
196 196
     {
197 197
         return [
198
-            "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet") . "}",
198
+            "GUID" => \core\common\Entity::uuid('', "wired-dot1x-ethernet")."}",
199 199
             "Name" => "eduroam configuration (wired network)",
200 200
             "Remove" => false,
201 201
             "Type" => "Ethernet",
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
         // if silverbullet, we deliver the client cert inline
237 237
 
238 238
         if ($selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) {
239
-            $eaparray['ClientCertRef'] = "[" . $this->clientCert['GUID'] . "]";
239
+            $eaparray['ClientCertRef'] = "[".$this->clientCert['GUID']."]";
240 240
             $eaparray['ClientCertType'] = "Ref";
241 241
         }
242 242
 
@@ -271,7 +271,7 @@  discard block
 block discarded – undo
271 271
         $jsonArray = ["Type" => "UnencryptedConfiguration"];
272 272
 
273 273
         foreach ($this->attributes['internal:CAs'][0] as $ca) {
274
-            $caRefs[] = "{" . $ca['uuid'] . "}";
274
+            $caRefs[] = "{".$ca['uuid']."}";
275 275
         }
276 276
         // define CA certificates
277 277
         foreach ($this->attributes['internal:CAs'][0] as $ca) {
@@ -281,15 +281,15 @@  discard block
 block discarded – undo
281 281
             if ($caSanitized1 === FALSE) {
282 282
                 throw new Exception("Error cropping PEM data at its BEGIN marker.");
283 283
             }
284
-            $this->loggerInstance->debug(4, $caSanitized1 . "\n");
284
+            $this->loggerInstance->debug(4, $caSanitized1."\n");
285 285
             // remove \n
286 286
             $caSanitized = str_replace("\n", "", $caSanitized1);
287
-            $jsonArray["Certificates"][] = ["GUID" => "{" . $ca['uuid'] . "}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized];
288
-            $this->loggerInstance->debug(3, $caSanitized . "\n");
287
+            $jsonArray["Certificates"][] = ["GUID" => "{".$ca['uuid']."}", "Remove" => false, "Type" => "Authority", "X509" => $caSanitized];
288
+            $this->loggerInstance->debug(3, $caSanitized."\n");
289 289
         }
290 290
         // if we are doing silverbullet, include the unencrypted(!) P12 as a client certificate
291 291
         if ($this->selectedEap == \core\common\EAP::EAPTYPE_SILVERBULLET) {
292
-            $jsonArray["Certificates"][] = ["GUID" => "[" . $this->clientCert['GUID'] . "]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"];
292
+            $jsonArray["Certificates"][] = ["GUID" => "[".$this->clientCert['GUID']."]", "PKCS12" => base64_encode($this->clientCert['certdataclear']), "Remove" => false, "Type" => "Client"];
293 293
         }
294 294
         $eaparray = $this->eapBlock($caRefs);
295 295
         // define Wi-Fi networks
@@ -312,7 +312,7 @@  discard block
 block discarded – undo
312 312
 
313 313
         file_put_contents('installer_profile', $finalJson);
314 314
 
315
-        $fileName = $this->installerBasename . '.onc';
315
+        $fileName = $this->installerBasename.'.onc';
316 316
 
317 317
         if (!$this->sign) {
318 318
             rename("installer_profile", $fileName);
@@ -323,7 +323,7 @@  discard block
 block discarded – undo
323 323
         // have the notion of signing
324 324
         // but if they ever change their mind, we are prepared
325 325
 
326
-        $outputFromSigning = system($this->sign . " installer_profile '$fileName' > /dev/null");
326
+        $outputFromSigning = system($this->sign." installer_profile '$fileName' > /dev/null");
327 327
         if ($outputFromSigning === FALSE) {
328 328
             $this->loggerInstance->debug(2, "Signing the ONC installer $fileName FAILED!\n");
329 329
         }
Please login to merge, or discard this patch.
web/diag/action_realmcheck.php 3 patches
Braces   +16 added lines, -1 removed lines patch added patch discarded remove patch
@@ -755,7 +755,22 @@
 block discarded – undo
755 755
                 }
756 756
             ?>
757 757
                 <div id="tabs-<?php echo $i;?>">
758
-                    <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button>
758
+                    <button id="run_<?php if ($i==3) {
759
+    echo 'd';
760
+} else {
761
+    echo 'o';
762
+}
763
+?>_tests"; onclick="run_<?php if ($i==3) {
764
+    echo 'dynamic';
765
+} else {
766
+    echo 'openroaming';
767
+}
768
+?>()"><?php if ($i==3) {
769
+    echo _("Repeat dynamic connectivity tests");
770
+} else {
771
+    echo _("Repeat OpenRoaming connectivity tests");
772
+}
773
+?></button>
759 774
 
760 775
                 <?php
761 776
                     echo "<div id='";
Please login to merge, or discard this patch.
Indentation   +16 added lines, -16 removed lines patch added patch discarded remove patch
@@ -578,9 +578,9 @@  discard block
 block discarded – undo
578 578
                     $naptr = $rfc7585suite->relevantNAPTR();
579 579
                     if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) {
580 580
                         if ($dynType == "") {
581
-                        	echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>";
581
+                            echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>";
582 582
                         } else {
583
-                        	echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>";
583
+                            echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>";
584 584
                         }
585 585
                     } else {
586 586
                         echo "<table>";
@@ -698,7 +698,7 @@  discard block
 block discarded – undo
698 698
                         echo "}
699 699
               </script>";
700 700
                         } else {
701
-                   echo ' 
701
+                    echo ' 
702 702
               function run_openroaming() {
703 703
                  running_ajax_openroaming = 0;
704 704
                  $("#main_openroaming_ico").attr("src",icon_loading);
@@ -720,10 +720,10 @@  discard block
 block discarded – undo
720 720
                         } 
721 721
                     }
722 722
                     if ($dynType == '') {
723
-                         $naptrs[0] = $naptr;
724
-                     } else {
725
-                         $naptrs[1] = $naptr;
726
-                     }
723
+                            $naptrs[0] = $naptr;
724
+                        } else {
725
+                            $naptrs[1] = $naptr;
726
+                        }
727 727
                 }
728 728
                     echo "<strong>" . _("Static connectivity tests") . "</strong>
729 729
          <table><tr>
@@ -736,7 +736,7 @@  discard block
 block discarded – undo
736 736
          </tr></table>";
737 737
                     }
738 738
                     if (isset($orrealm) && count($orrealm) && ($naptrs[1] > 0)) {
739
-                      echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong>
739
+                        echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong>
740 740
          <table><tr>
741 741
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'>&nbsp;</td>
742 742
          </tr></table>";
@@ -774,12 +774,12 @@  discard block
 block discarded – undo
774 774
             <?php
775 775
             for ($i=3; $i<5; $i++) {
776 776
                 if ($i == 3 && $naptrs[0] <= 0) {
777
-                   continue;
777
+                    continue;
778 778
                 }
779 779
                 if ($i == 4) {
780
-                   if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) {
781
-                       continue;
782
-                   }
780
+                    if ((count($orrealm) == 0) || ($naptrs[1] <= 0)) {
781
+                        continue;
782
+                    }
783 783
                 }
784 784
                 if ($i == 3) {
785 785
                     $rfc7585suite = $dnsChecks;
@@ -796,16 +796,16 @@  discard block
 block discarded – undo
796 796
                     echo "_tests'><fieldset class='option_container'>
797 797
                 <legend><strong>";
798 798
                     if ($i==3) {
799
-                     echo _("DYNAMIC connectivity tests");
799
+                        echo _("DYNAMIC connectivity tests");
800 800
                     } else {
801
-                     echo _("OpenRoaming connectivity tests");
801
+                        echo _("OpenRoaming connectivity tests");
802 802
                     }
803 803
                     echo  "</strong></legend>";
804 804
                     $prefix1 = 'dynamic';
805 805
                     $prefix2 = '';
806 806
                     if ($i == 4) {
807
-                    	$prefix1 = 'openroaming';
808
-                    	$prefix2 = $prefix1;
807
+                        $prefix1 = 'openroaming';
808
+                        $prefix2 = $prefix1;
809 809
                     }
810 810
                     $resultstoprint = [];
811 811
                     if (count($rfc7585suite->NAPTR_hostname_records) > 0) {
Please login to merge, or discard this patch.
Spacing   +78 added lines, -78 removed lines patch added patch discarded remove patch
@@ -19,7 +19,7 @@  discard block
 block discarded – undo
19 19
  *          <base_url>/copyright.php after deploying the software
20 20
  */
21 21
 
22
-require_once dirname(dirname(__DIR__)) . "/config/_config.php";
22
+require_once dirname(dirname(__DIR__))."/config/_config.php";
23 23
 
24 24
 $loggerInstance = new \core\common\Logging();
25 25
 
@@ -69,13 +69,13 @@  discard block
 block discarded – undo
69 69
             $dnsChecksOR = new \core\diag\RFC7585Tests($check_realm, "aaa+auth:radius.tls.tcp");
70 70
         }
71 71
     } else {
72
-        $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>";
72
+        $error_message = _("You asked for a realm check, but we don't know the realm for this profile!")."</p>";
73 73
     }
74 74
 } else { // someone else's realm, and we don't know anything about it... only shallow checks
75 75
     $check_realm = $validator->realm($realm ?? $_SESSION['check_realm'] ?? "");
76 76
     if ($check_realm !== FALSE) {
77 77
         $_SESSION['check_realm'] = $check_realm;
78
-        $testsuite = new \core\diag\RADIUSTests($check_realm, "@" . $check_realm);
78
+        $testsuite = new \core\diag\RADIUSTests($check_realm, "@".$check_realm);
79 79
         $dnsChecks = new \core\diag\RFC7585Tests($check_realm);
80 80
     } else {
81 81
         $error_message = _("No valid realm name given, cannot execute any checks!");
@@ -121,7 +121,7 @@  discard block
 block discarded – undo
121 121
     var listofcas = "<?php echo _("You should update your list of accredited CAs") ?>";
122 122
     var getitfrom = "<?php echo _("Get it from here.") ?>";
123 123
     var listsource = "<?php echo \config\Diagnostics::RADIUSTESTS['accreditedCAsURL'] ?>";
124
-    var moretext = "<?php echo _("more") . "&raquo;" ?>";
124
+    var moretext = "<?php echo _("more")."&raquo;" ?>";
125 125
     var lesstext = "<?php echo "&laquo" ?>";
126 126
     var morealltext = "<?php echo _("Show detailed information for all tests") ?>";
127 127
     var unknownca_code = "<?php echo \core\diag\RADIUSTests::CERTPROB_UNKNOWN_CA ?>";
@@ -268,10 +268,10 @@  discard block
 block discarded – undo
268 268
                     
269 269
                     cliinfo = cliinfo + '<li>';
270 270
                     if (data.ca[key].certificate[c].finalerror && data.ca[key].certificate[c].finalerror==2) {
271
-                        cliinfo = cliinfo + ' <?php echo _("this test was skipped - no appropriate client certificate");?>' + '</ul></li>';
271
+                        cliinfo = cliinfo + ' <?php echo _("this test was skipped - no appropriate client certificate"); ?>' + '</ul></li>';
272 272
                     } else {
273 273
                         cliinfo = cliinfo + '<table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] + '" style="width: 24px;"></td><td>' + state;
274
-                        cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+'&nbsp;") . ")"; ?>' + add + '</td></tr>';
274
+                        cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+'&nbsp;").")"; ?>' + add + '</td></tr>';
275 275
                         cliinfo = cliinfo + '</tbody></table></ul></li>';
276 276
                     }
277 277
                    
@@ -470,7 +470,7 @@  discard block
 block discarded – undo
470 470
                 });
471 471
             }
472 472
             o = o + cert_data + '</table>';
473
-            $("#eap_test" + data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="' + icons[v.level] + '"><span style="position: relative; top: -5px; <?php echo $start;?>: 1em">' + v.eap + ' &ndash; <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+'&nbsp;") ?></span></strong><div class="more" style="padding-<?php echo $start;?>: 40px"><div class="morecontent"><div style="display:none; background: #eee;">' + o + '</div><a href="" class="morelink">' + moretext + '</a></div></div>');
473
+            $("#eap_test" + data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="' + icons[v.level] + '"><span style="position: relative; top: -5px; <?php echo $start; ?>: 1em">' + v.eap + ' &ndash; <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+'&nbsp;") ?></span></strong><div class="more" style="padding-<?php echo $start; ?>: 40px"><div class="morecontent"><div style="display:none; background: #eee;">' + o + '</div><a href="" class="morelink">' + moretext + '</a></div></div>');
474 474
         });
475 475
     }
476 476
 
@@ -481,8 +481,8 @@  discard block
 block discarded – undo
481 481
 <?php
482 482
 foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
483 483
     print "
484
-$(\"#live_src" . $hostindex . "_img\").attr('src',icon_loading);
485
-$(\"#live_src" . $hostindex . "_img\").show();
484
+$(\"#live_src" . $hostindex."_img\").attr('src',icon_loading);
485
+$(\"#live_src" . $hostindex."_img\").show();
486 486
 $.ajax({
487 487
     url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm,
488 488
     type: 'POST',
@@ -513,15 +513,15 @@  discard block
 block discarded – undo
513 513
 <?php
514 514
 foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
515 515
     if ($testedProfile !== NULL) {
516
-        $extraarg = "profile_id: " . $testedProfile->identifier . ", ";
516
+        $extraarg = "profile_id: ".$testedProfile->identifier.", ";
517 517
     } else {
518 518
         $extraarg = "";
519 519
     }
520 520
     print "
521
-$(\"#src" . $hostindex . "_img\").attr('src',icon_loading);
521
+$(\"#src" . $hostindex."_img\").attr('src',icon_loading);
522 522
 $(\"#src$hostindex\").html('');
523 523
 running_ajax_stat++;
524
-$.ajax({url:'radius_tests.php', timeout: ajax_timeout,  data:{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex'}, error: eee, success: udp, dataType: 'json'}); 
524
+$.ajax({url:'radius_tests.php', timeout: ajax_timeout,  data:{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex'}, error: eee, success: udp, dataType: 'json'}); 
525 525
 ";
526 526
 }
527 527
 ?>
@@ -549,7 +549,7 @@  discard block
 block discarded – undo
549 549
     if ($check_realm === FALSE) {
550 550
         print "<p>$error_message</p>";
551 551
     } else {
552
-        print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n";
552
+        print "<h1>".sprintf(_("Realm testing for: %s"), $check_realm)."</h1>\n";
553 553
         ?>
554 554
         <div id="debug_out" style="display: none"></div>
555 555
         <div id="tabs" style="min-width: 600px; max-width:1000px">
@@ -571,25 +571,25 @@  discard block
 block discarded – undo
571 571
                     // NAPTR existence check
572 572
                     if ($dynType == "") {
573 573
                         $rfc7585suite = $dnsChecks;
574
-                        echo "<strong>" . _("DNS checks") . "</strong><div>";
574
+                        echo "<strong>"._("DNS checks")."</strong><div>";
575 575
                     } else {
576 576
                         if (count($orrealm) == 0) {
577 577
                             continue;
578 578
                         }
579 579
                         $rfc7585suite = $dnsChecksOR;
580
-                        echo "<strong>" . _("OpenRoaming DNS checks") . "</strong><div>";
580
+                        echo "<strong>"._("OpenRoaming DNS checks")."</strong><div>";
581 581
                     }
582 582
                     $naptr = $rfc7585suite->relevantNAPTR();
583 583
                     if ($naptr == \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) {
584 584
                         if ($dynType == "") {
585
-                        	echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>";
585
+                        	echo "<tr><td>"._("Dynamic discovery test is not configured")."</td><td>";
586 586
                         } else {
587
-                        	echo "<tr><td>" . _("OpenRoaming connectivity test is not configured") . "</td><td>";
587
+                        	echo "<tr><td>"._("OpenRoaming connectivity test is not configured")."</td><td>";
588 588
                         }
589 589
                     } else {
590 590
                         echo "<table>";
591 591
                         // output in friendly words
592
-                        echo "<tr><td>" . _("Checking NAPTR existence:") . "</td><td>";
592
+                        echo "<tr><td>"._("Checking NAPTR existence:")."</td><td>";
593 593
                         switch ($naptr) {
594 594
                             case \core\diag\RFC7585Tests::RETVAL_NONAPTR:
595 595
                                 echo _("This realm has no NAPTR records.");
@@ -604,7 +604,7 @@  discard block
 block discarded – undo
604 604
 
605 605
                         // compliance checks for NAPTRs
606 606
                         if ($naptr > 0) {
607
-                            echo "<tr><td>" . _("Checking NAPTR compliance (flag = S and regex = {empty}):") . "</td><td>";
607
+                            echo "<tr><td>"._("Checking NAPTR compliance (flag = S and regex = {empty}):")."</td><td>";
608 608
                             $naptr_valid = $rfc7585suite->relevantNAPTRcompliance();
609 609
                             switch ($naptr_valid) {
610 610
                                 case \core\diag\RADIUSTests::RETVAL_OK:
@@ -619,7 +619,7 @@  discard block
 block discarded – undo
619 619
                         // SRV resolution
620 620
                         if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK) {
621 621
                             $srv = $rfc7585suite->relevantNAPTRsrvResolution();
622
-                            echo "<tr><td>" . _("Checking SRVs:") . "</td><td>";
622
+                            echo "<tr><td>"._("Checking SRVs:")."</td><td>";
623 623
                             switch ($srv) {
624 624
                                 case \core\diag\RADIUSTests::RETVAL_SKIPPED:
625 625
                                     echo _("This check was skipped.");
@@ -635,7 +635,7 @@  discard block
 block discarded – undo
635 635
                         // IP addresses for the hosts
636 636
                         if ($naptr > 0 && $naptr_valid == \core\diag\RADIUSTests::RETVAL_OK && $srv > 0) {
637 637
                             $hosts = $rfc7585suite->relevantNAPTRhostnameResolution();
638
-                            echo "<tr><td>" . _("Checking IP address resolution:") . "</td><td>";
638
+                            echo "<tr><td>"._("Checking IP address resolution:")."</td><td>";
639 639
                             switch ($srv) {
640 640
                                 case \core\diag\RADIUSTests::RETVAL_SKIPPED:
641 641
                                     echo _("This check was skipped.");
@@ -652,12 +652,12 @@  discard block
 block discarded – undo
652 652
                         echo "</table><br/>";
653 653
                         if ($dynType == "") {
654 654
                             if (count($testsuite->listerrors()) == 0) {
655
-                                echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!");
655
+                                echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("with no DNS errors encountered. Congratulations!");
656 656
                             } else {
657
-                                echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.");
657
+                                echo sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC")))._("but there were DNS errors! Check them!")." "._("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.");
658 658
                                 echo "<div class='notacceptable'><table>";
659 659
                                 foreach ($testsuite->listerrors() as $details) {
660
-                                    echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>";
660
+                                    echo "<tr><td>".$details['TYPE']."</td><td>".$details['TARGET']."</td></tr>";
661 661
                                 }
662 662
                                 echo "</table></div>";
663 663
                             }
@@ -676,7 +676,7 @@  discard block
 block discarded – undo
676 676
                  $("#dynamic_tests").show();
677 677
               ';             
678 678
                         foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) {
679
-                            $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port'];
679
+                            $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port'];
680 680
                             $expectedName = $addr['hostname'];
681 681
                             $ssltest = 1;
682 682
                             if (isset($addr['unavailable']) && $addr['unavailable']) {
@@ -694,9 +694,9 @@  discard block
 block discarded – undo
694 694
                             $protstr = implode(';', $protocols);
695 695
                             print "
696 696
                             running_ajax_dyn++;
697
-                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout,  data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: capath, dataType: 'json'});
697
+                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout,  data:{test_type: 'capath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: capath, dataType: 'json'});
698 698
                             running_ajax_dyn++;
699
-                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: clients, dataType: 'json'});
699
+                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'clients', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: clients, dataType: 'json'});
700 700
                        ";
701 701
                         }
702 702
                         echo "}
@@ -712,11 +712,11 @@  discard block
 block discarded – undo
712 712
                  $("#openroaming_tests").show();
713 713
               ';
714 714
                         foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) {
715
-                            $host = ($addr['family'] == "IPv6" ? "[" : "") . $addr['IP'] . ($addr['family'] == "IPv6" ? "]" : "") . ":" . $addr['port'];
715
+                            $host = ($addr['family'] == "IPv6" ? "[" : "").$addr['IP'].($addr['family'] == "IPv6" ? "]" : "").":".$addr['port'];
716 716
                             $expectedName = $addr['hostname'];
717 717
                             print "
718 718
                             running_ajax_openroaming++;
719
-                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '" . $gui->languageInstance->getLang() . "', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: capath, dataType: 'json'});
719
+                            $.ajax({url:'radius_tests.php', timeout: ajax_timeout, data:{test_type: 'openroamingcapath', realm: realm, src: '$host', lang: '".$gui->languageInstance->getLang()."', hostindex: '$hostindex', expectedname: '$expectedName', ssltest: $ssltest, protocols: '$protstr' }, error: eee, success: capath, dataType: 'json'});
720 720
                        ";
721 721
                         }
722 722
                         echo "}
@@ -729,18 +729,18 @@  discard block
 block discarded – undo
729 729
                          $naptrs[1] = $naptr;
730 730
                      }
731 731
                 }
732
-                    echo "<strong>" . _("Static connectivity tests") . "</strong>
732
+                    echo "<strong>"._("Static connectivity tests")."</strong>
733 733
          <table><tr>
734 734
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'>&nbsp;</td>
735 735
          </tr></table>";
736 736
                     if ($naptrs[0] > 0) {
737
-                        echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong>
737
+                        echo "<hr><strong>"._("Dynamic connectivity tests")."</strong>
738 738
          <table><tr>
739 739
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'>&nbsp;</td>
740 740
          </tr></table>";
741 741
                     }
742 742
                     if (isset($orrealm) && count($orrealm) && ($naptrs[1] > 0)) {
743
-                      echo "<hr><strong>" . _("OpenRoaming connectivity tests") . "</strong>
743
+                      echo "<hr><strong>"._("OpenRoaming connectivity tests")."</strong>
744 744
          <table><tr>
745 745
          <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_openroaming_ico' class='icon'></td><td id='main_openroaming_result' style='display:none'>&nbsp;</td>
746 746
          </tr></table>";
@@ -760,12 +760,12 @@  discard block
 block discarded – undo
760 760
                     print "<p>";
761 761
                     foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
762 762
                         print "<hr>";
763
-                        printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>");
763
+                        printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>");
764 764
                         print "<table id='results$hostindex'  style='width:100%' class='udp_results'>
765 765
 <tr>
766
-<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td>
766
+<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td>
767 767
 <td id='src$hostindex' colspan=2>
768
-" . _("testing...") . "
768
+"._("testing...")."
769 769
 </td>
770 770
 </tr>
771 771
 </table>";
@@ -776,7 +776,7 @@  discard block
 block discarded – undo
776 776
 
777 777
             </div>
778 778
             <?php
779
-            for ($i=3; $i<5; $i++) {
779
+            for ($i = 3; $i < 5; $i++) {
780 780
                 if ($i == 3 && $naptrs[0] <= 0) {
781 781
                    continue;
782 782
                 }
@@ -791,15 +791,15 @@  discard block
 block discarded – undo
791 791
                     $rfc7585suite = $dnsChecksOR;
792 792
                 }
793 793
             ?>
794
-                <div id="tabs-<?php echo $i;?>">
795
-                    <button id="run_<?php if ($i==3) echo 'd'; else echo 'o';?>_tests"; onclick="run_<?php if ($i==3) echo 'dynamic'; else echo 'openroaming';?>()"><?php if ($i==3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests");?></button>
794
+                <div id="tabs-<?php echo $i; ?>">
795
+                    <button id="run_<?php if ($i == 3) echo 'd'; else echo 'o'; ?>_tests"; onclick="run_<?php if ($i == 3) echo 'dynamic'; else echo 'openroaming'; ?>()"><?php if ($i == 3) echo _("Repeat dynamic connectivity tests"); else echo _("Repeat OpenRoaming connectivity tests"); ?></button>
796 796
 
797 797
                 <?php
798 798
                     echo "<div id='";
799
-                    if ($i==3) { echo 'dynamic'; } else { echo 'openroaming'; }
799
+                    if ($i == 3) { echo 'dynamic'; } else { echo 'openroaming'; }
800 800
                     echo "_tests'><fieldset class='option_container'>
801 801
                 <legend><strong>";
802
-                    if ($i==3) {
802
+                    if ($i == 3) {
803 803
                      echo _("DYNAMIC connectivity tests");
804 804
                     } else {
805 805
                      echo _("OpenRoaming connectivity tests");
@@ -813,11 +813,11 @@  discard block
 block discarded – undo
813 813
                     }
814 814
                     $resultstoprint = [];
815 815
                     if (count($rfc7585suite->NAPTR_hostname_records) > 0) {
816
-                        $resultstoprint[] = '<div style="align:'.$end.'; display: none;" id="' . $prefix1 . '_result_fail">' . _("Some errors were found during the tests, see below") . '</div><div style="align:'.$end.'; display: none;" id="' . $prefix1 . '_result_pass">' . _("All tests passed, congratulations!") . '</div>';
817
-                        $resultstoprint[] = '<div style="align:'.$end.';"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>";
816
+                        $resultstoprint[] = '<div style="align:'.$end.'; display: none;" id="'.$prefix1.'_result_fail">'._("Some errors were found during the tests, see below").'</div><div style="align:'.$end.'; display: none;" id="'.$prefix1.'_result_pass">'._("All tests passed, congratulations!").'</div>';
817
+                        $resultstoprint[] = '<div style="align:'.$end.';"><a href="" class="moreall">'._('Show detailed information for all tests').'</a></div>'.'<p><strong>'._("Checking server handshake...")."</strong><p>";
818 818
                         foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) {
819
-                            $bracketaddr = ($addr["family"] == "IPv6" ? "[" . $addr["IP"] . "]" : $addr["IP"]);
820
-                            $resultstoprint[] = '<p><strong>' . $bracketaddr . ' TCP/' . $addr['port'] . '</strong> (' . $addr['hostname'] . ')';
819
+                            $bracketaddr = ($addr["family"] == "IPv6" ? "[".$addr["IP"]."]" : $addr["IP"]);
820
+                            $resultstoprint[] = '<p><strong>'.$bracketaddr.' TCP/'.$addr['port'].'</strong> ('.$addr['hostname'].')';
821 821
                             $prots = [];
822 822
                             if (isset($addr['protocols'])) {
823 823
                                 foreach ($addr['protocols'] as $protocol) {
@@ -827,18 +827,18 @@  discard block
 block discarded – undo
827 827
                                 }
828 828
                             }
829 829
                             if (!empty($prots)) {
830
-                                $resultstoprint[] = ' ' . _("supported TLS protocols: ");
830
+                                $resultstoprint[] = ' '._("supported TLS protocols: ");
831 831
                                 $resultstoprint[] = implode(', ', $prots);
832 832
                                 if (!isset($addr['istls13']) || !$addr['istls13']) {
833
-                                    $resultstoprint[] = ' ' . '<font color="red">' . _("not supported: ") . 'TLS1.3</font>';
833
+                                    $resultstoprint[] = ' '.'<font color="red">'._("not supported: ").'TLS1.3</font>';
834 834
                                 }
835 835
                             }
836 836
                             $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>';
837
-                            $resultstoprint[] = "<table id='" . $prefix2 . "caresults$hostindex'  style='width:100%'>
837
+                            $resultstoprint[] = "<table id='".$prefix2."caresults$hostindex'  style='width:100%'>
838 838
 <tr>
839
-<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcca$hostindex" . "_img'></td>
840
-<td id='" . $prefix2 . "srcca$hostindex'>
841
-" . _("testing...") . "
839
+<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcca$hostindex"."_img'></td>
840
+<td id='" . $prefix2."srcca$hostindex'>
841
+"._("testing...")."
842 842
 </td>
843 843
 </tr>
844 844
 </table>";
@@ -846,26 +846,26 @@  discard block
 block discarded – undo
846 846
                         }
847 847
                         $clientstest = [];
848 848
                         foreach ($rfc7585suite->NAPTR_hostname_records as $hostindex => $addr) {
849
-                            $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>';
850
-                            $clientstest[] = "<span id='" . $prefix2 . "clientresults$hostindex'><table style='width:100%'>
849
+                            $clientstest[] = '<p><strong>'.$addr['IP'].' TCP/'.$addr['port'].'</strong></p><ol>';
850
+                            $clientstest[] = "<span id='".$prefix2."clientresults$hostindex'><table style='width:100%'>
851 851
 <tr>
852 852
 <td class='icon_td'>";
853
-                            if ($i == 4 ) {
853
+                            if ($i == 4) {
854 854
                                 $clientstest[] = "<!--";
855 855
                             }
856
-                            $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='" . $prefix2 . "srcclient$hostindex" . "_img'></td>
857
-<td id='" . $prefix2 . "srcclient$hostindex'>
858
-" . _("testing...");
856
+                            $clientstest[] = "<img src='../resources/images/icons/loading51.gif' id='".$prefix2."srcclient$hostindex"."_img'></td>
857
+<td id='" . $prefix2."srcclient$hostindex'>
858
+"._("testing...");
859 859
 
860
-                            if ($i == 4 ) {
861
-                                $clientstest[] = "-->" . _("not implemented yet");
860
+                            if ($i == 4) {
861
+                                $clientstest[] = "-->"._("not implemented yet");
862 862
                             }
863 863
                             $clientstest[] = "</td></tr></table></span>";
864 864
                             $clientstest[] = '</ol>';
865 865
                         }
866 866
                         echo '<div style="align:'.$end.';">';
867 867
                         echo join('', $resultstoprint);
868
-                        echo '<span id="' . $prefix2 . 'clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from  CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>';
868
+                        echo '<span id="'.$prefix2.'clientstest" style="display: none;"><p><hr><b>'._('Checking if certificates from  CAs are accepted...').'</b><p>'._('A few client certificates will be tested to check if servers are resistant to some certificate problems.').'<p>';
869 869
                         print join('', $clientstest);
870 870
                         echo '</span>';
871 871
                         echo '</div>';
@@ -879,7 +879,7 @@  discard block
 block discarded – undo
879 879
                 //     check if truncates/dies on Operator-Name
880 880
                 if ($my_profile !== NULL) {
881 881
                     echo "<div id='tabs-n'><fieldset class='option_container'>
882
-                <legend><strong>" . _("Live login test") . "</strong></legend>";
882
+                <legend><strong>" . _("Live login test")."</strong></legend>";
883 883
                     $prof_compl = $my_profile->getEapMethodsinOrderOfPreference(1);
884 884
                     if (count($prof_compl) > 0) {
885 885
                         $passwordReqired = FALSE;
@@ -892,34 +892,34 @@  discard block
 block discarded – undo
892 892
                                 $clientCertRequired = TRUE;
893 893
                             }
894 894
                         }
895
-                        echo "<div id='disposable_credential_container'><p>" . _("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.") . "</p>
896
-                    <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.") . "</p>
897
-                    <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div>
895
+                        echo "<div id='disposable_credential_container'><p>"._("If you enter an existing login credential here, you can test the actual authentication from various checkpoints all over the world.")."</p>
896
+                    <p>" . _("The test will use all EAP types you have set in your profile information to check whether the right CAs and server names are used, and of course whether the login with these credentials and the given EAP type actually worked. If you have set anonymous outer ID, the test will use that.")."</p>
897
+                    <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!")."</p></div>
898 898
                     <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'>
899 899
                     <input type='hidden' name='test_type' value='udp_login'>
900
-                    <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang() . "'>
901
-                    <input type='hidden' name='profile_id' value='" . $my_profile->identifier . "'>
900
+                    <input type='hidden' name='lang' value='" . $gui->languageInstance->getLang()."'>
901
+                    <input type='hidden' name='profile_id' value='" . $my_profile->identifier."'>
902 902
                     <table id='live_tests'>";
903 903
 // if any password based EAP methods are available enable this section
904 904
                         if ($passwordReqired) {
905
-                            echo "<tr><td colspan='2'><strong>" . _("Password-based EAP types") . "</strong></td></tr>
906
-                        <tr><td>" . _("Real (inner) username:") . "</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>";
907
-                            echo "<tr><td>" . _("Anonymous outer ID (optional):") . "</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>";
908
-                            echo "<tr><td>" . _("Password:") . "</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>";
905
+                            echo "<tr><td colspan='2'><strong>"._("Password-based EAP types")."</strong></td></tr>
906
+                        <tr><td>" . _("Real (inner) username:")."</td><td><input type='text' id='username' class='mandatory' name='username'/></td></tr>";
907
+                            echo "<tr><td>"._("Anonymous outer ID (optional):")."</td><td><input type='text' id='outer_username' name='outer_username'/></td></tr>";
908
+                            echo "<tr><td>"._("Password:")."</td><td><input type='text' id='password' class='mandatory' name='password'/></td></tr>";
909 909
                         }
910 910
                         // ask for cert + privkey if TLS-based method is active
911 911
                         if ($clientCertRequired) {
912
-                            echo "<tr><td colspan='2'><strong>" . _("Certificate-based EAP types") . "</strong></td></tr>
913
-                        <tr><td>" . _("Certificate file (.p12 or .pfx):") . "</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr>
914
-                        <tr><td>" . _("Certificate password, if any:") . "</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr>
915
-                        <tr><td>" . _("Username, if different from certificate Subject:") . "</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>";
912
+                            echo "<tr><td colspan='2'><strong>"._("Certificate-based EAP types")."</strong></td></tr>
913
+                        <tr><td>" . _("Certificate file (.p12 or .pfx):")."</td><td><input type='file' id='cert' accept='application/x-pkcs12' name='cert'/></td></tr>
914
+                        <tr><td>" . _("Certificate password, if any:")."</td><td><input type='text' id='privkey' name='privkey_pass'/></td></tr>
915
+                        <tr><td>" . _("Username, if different from certificate Subject:")."</td><td><input type='text' id='tls_username' name='tls_username'/></td></tr>";
916 916
                         }
917
-                        echo "<tr><td colspan='2'><button id='submit_credentials'>" . _("Submit credentials") . "</button></td></tr></table></form>";
917
+                        echo "<tr><td colspan='2'><button id='submit_credentials'>"._("Submit credentials")."</button></td></tr></table></form>";
918 918
                         echo "<div id='live_login_results' style='display:none'>";
919 919
                         foreach (\config\Diagnostics::RADIUSTESTS['UDP-hosts'] as $hostindex => $host) {
920 920
                             print "<hr>";
921
-                            printf(_("Testing from: %s"), "<strong>" . \config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>");
922
-                            print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; $start: 20px; bottom: 0px; '></span>";
921
+                            printf(_("Testing from: %s"), "<strong>".\config\Diagnostics::RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>");
922
+                            print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; $start: 20px; bottom: 0px; '></span>";
923 923
                             print "<div id='eap_test$hostindex' class='eap_test_results'></div>";
924 924
                         }
925 925
                         echo "</div>";
@@ -934,9 +934,9 @@  discard block
 block discarded – undo
934 934
             }
935 935
 
936 936
             if (isset($_POST['comefrom'])) {
937
-                $return = htmlspecialchars_decode($_POST['comefrom']) . ( $inst_id ? "?inst_id=" . $inst_id : "" );
937
+                $return = htmlspecialchars_decode($_POST['comefrom']).($inst_id ? "?inst_id=".$inst_id : "");
938 938
                 echo "<form method='post' action='$return' accept-charset='UTF-8'>
939
-                    <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CLOSE . "'>" . sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp) . "</button>"
939
+                    <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CLOSE."'>".sprintf(_("Return to %s administrator area"), core\common\Entity::$nomenclature_idp)."</button>"
940 940
                 . "</form>";
941 941
             }
942 942
             if ($check_realm !== FALSE) {
Please login to merge, or discard this patch.
core/CertificationAuthorityEduPki.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "User SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -75,19 +75,19 @@  discard block
 block discarded – undo
75 75
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
76 76
         try {
77 77
             $altArray = [# Array mit den Subject Alternative Names
78
-                "email:" . $csr["USERNAME"]
78
+                "email:".$csr["USERNAME"]
79 79
             ];
80 80
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
81 81
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
82
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n");
83
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n");
82
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n");
83
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n");
84 84
             $this->loggerInstance->debug(5, "PARAM_3: ");
85 85
             $this->loggerInstance->debug(5, $altArray);
86
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n");
87
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
88
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
89
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n");
90
-            $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n");
86
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n");
87
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
88
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
89
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n");
90
+            $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n");
91 91
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
92 92
             $soapNewRequest = $soapPub->newRequest(
93 93
                     CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID
@@ -109,11 +109,11 @@  discard block
 block discarded – undo
109 109
         } catch (Exception $e) {
110 110
             // PHP 7.1 can do this much better
111 111
             if (is_soap_fault($e)) {
112
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
112
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
113 113
                     $e->faultstring
114 114
                 }\n");
115 115
             }
116
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
116
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
117 117
         }
118 118
         try {
119 119
             $soap = $this->initEduPKISoapSession("RA");
@@ -125,8 +125,8 @@  discard block
 block discarded – undo
125 125
                     $soapReqnum, [
126 126
                 "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID,
127 127
                 "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE,
128
-                "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'],
129
-                "SubjectAltNames" => ["email:" . $csr["USERNAME"]],
128
+                "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'],
129
+                "SubjectAltNames" => ["email:".$csr["USERNAME"]],
130 130
                 "NotBefore" => (new \DateTime())->format('c'),
131 131
                 "NotAfter" => $expiry->format('c'),
132 132
                     ]
@@ -145,7 +145,7 @@  discard block
 block discarded – undo
145 145
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
146 146
             // rather than just using the string. Grr.
147 147
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
148
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
148
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
149 149
             // retrieve our RA cert from filesystem                    
150 150
             // the RA certificates are not needed right now because we
151 151
             // have resorted to S/MIME signatures with openssl command-line
@@ -157,7 +157,7 @@  discard block
 block discarded – undo
157 157
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
158 158
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
159 159
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
160
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
160
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
161 161
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
162 162
             $output = [];
163 163
             $return = 999;
@@ -166,14 +166,14 @@  discard block
 block discarded – undo
166 166
                 throw new Exception("Non-zero return value from openssl smime!");
167 167
             }
168 168
             // and get the signature blob back from the filesystem
169
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
169
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
170 170
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
171
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
172
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
173
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
171
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
172
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
173
+            $this->loggerInstance->debug(5, $detachedSig."\n");
174 174
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
175
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
176
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
175
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
176
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
177 177
             if ($soapIssueCert === FALSE) {
178 178
                 throw new Exception("The locally approved request was NOT processed by the CA.");
179 179
             }
@@ -210,9 +210,9 @@  discard block
 block discarded – undo
210 210
                 throw new Exception("CAInfo has no root certificate for us!");
211 211
             }
212 212
         } catch (SoapFault $e) {
213
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
213
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
214 214
         } catch (Exception $e) {
215
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
215
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
216 216
         }
217 217
         return [
218 218
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -245,12 +245,12 @@  discard block
 block discarded – undo
245 245
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
246 246
             // rather than just using the string. Grr.
247 247
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
248
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
248
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
249 249
             // retrieve our RA cert from filesystem
250 250
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
251 251
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
252 252
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
253
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT;
253
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT;
254 254
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
255 255
             $output = [];
256 256
             $return = 999;
@@ -259,7 +259,7 @@  discard block
 block discarded – undo
259 259
                 throw new Exception("Non-zero return value from openssl smime!");
260 260
             }
261 261
             // and get the signature blob back from the filesystem
262
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
262
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
263 263
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
264 264
             if ($soapIssueRev === FALSE) {
265 265
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -267,9 +267,9 @@  discard block
 block discarded – undo
267 267
         } catch (Exception $e) {
268 268
             // PHP 7.1 can do this much better
269 269
             if (is_soap_fault($e)) {
270
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
270
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
271 271
             }
272
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
272
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
273 273
         }
274 274
     }
275 275
 
@@ -369,9 +369,9 @@  discard block
 block discarded – undo
369 369
      */
370 370
     public function soapToXmlInteger($x)
371 371
     {
372
-        return '<' . $x[0] . '>'
372
+        return '<'.$x[0].'>'
373 373
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
374
-                . '</' . $x[0] . '>';
374
+                . '</'.$x[0].'>';
375 375
     }
376 376
 
377 377
     /**
@@ -390,9 +390,9 @@  discard block
 block discarded – undo
390 390
         // dump private key into directory
391 391
         $outstring = "";
392 392
         openssl_pkey_export($privateKey, $outstring);
393
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
393
+        file_put_contents($tempdir."/pkey.pem", $outstring);
394 394
         // PHP can only do one DC in the Subject. But we need three.
395
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
395
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
396 396
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
397 397
         $output = [];
398 398
         $return = 999;
Please login to merge, or discard this patch.